mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 13:53:31 +01:00
Remove changes files that have also appeared in 0.4.4 releases.
This commit is contained in:
parent
db10d00199
commit
06c31b1b79
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes (logging):
|
||||
- Downgrade a noisy log message that could occur naturally when
|
||||
receiving an extrainfo document that we no longer want.
|
||||
Fixes bug 16016; bugfix on 0.2.6.3-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Minor bugfixes (linux seccomp2 sandbox):
|
||||
- Fix a regression on sandboxing rules for the openat() syscall.
|
||||
The fix for bug 25440 fixed the problem on systems with glibc >=
|
||||
2.27 but broke tor on previous versions of glibc. We now apply
|
||||
the correct seccomp rule according to the running glibc version.
|
||||
Patch from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (windows):
|
||||
- Fix a bug that prevented Tor from starting if its log file
|
||||
grew above 2GB. Fixes bug 31036; bugfix on 0.2.1.8-alpha.
|
@ -1,4 +0,0 @@
|
||||
o Major bugfixes (NSS):
|
||||
- Fix out-of-bound memory access in `tor_tls_cert_matches_key()` when Tor is
|
||||
compiled with NSS support. Fixes bug 33119; bugfix on 0.3.5.1-alpha. This
|
||||
issue is also tracked as TROVE-2020-001.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (onion services v3):
|
||||
- Avoid a non-fatal assert log in an edge-case of opening an intro circuit
|
||||
as a client. Fixes bug 34084; bugfix on 0.3.2.1-alpha.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (onion service v3):
|
||||
- Remove a BUG() warning that could trigger in certain unlikely edge-cases.
|
||||
Fixes bug 34086; bugfix on 0.3.2.1-alpha.
|
@ -1,3 +0,0 @@
|
||||
o Minor features (entry guards):
|
||||
- Reinstate support for GUARD NEW/UP/DOWN control port events.
|
||||
Closes ticket 40001.
|
@ -1,9 +0,0 @@
|
||||
o Minor bugfixes (linux seccomp2 sandbox):
|
||||
- Makes the seccomp sandbox allow the correct syscall for opendir
|
||||
according to the running glibc version. The opendir function
|
||||
either uses open or openat but the current code does not
|
||||
differenciate between opendir and open calls. This adds a new
|
||||
seccomp sandbox rule for opendir. This fixes crashes when
|
||||
reloading torrc with sandbox enabled when running on glibc
|
||||
2.15 to 2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020;
|
||||
bugfix on 0.3.5.11.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (compiler warnings):
|
||||
- Fix a compiler warning on platforms with 32-bit time_t values.
|
||||
Fixes bug 40028; bugfix on 0.3.2.8-rc.
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes (linux seccomp2 sandbox):
|
||||
- Fix startup crash with seccomp sandbox enabled when tor tries to
|
||||
open the data directory. Patch from Daniel Pinto. Fixes bug 40072;
|
||||
bugfix on 0.4.4.3-alpha-dev.
|
@ -1,5 +0,0 @@
|
||||
o Minor bugfixes (correctness, buffers):
|
||||
- Fix a correctness bug that could cause an assertion failure if we ever
|
||||
tried using the buf_move_all() function with an empty input.
|
||||
As far as we know, no released versions of Tor do this.
|
||||
Fixes bug 40076; bugfix on 0.3.3.1-alpha.
|
@ -1,5 +0,0 @@
|
||||
o Minor bugfixes (relay, self-testing):
|
||||
- When starting up as a relay, if we haven't been able to verify that
|
||||
we're reachable, only launch reachability tests at most once a minute.
|
||||
Previously, we had been launching tests up to once a second, which
|
||||
was needlessly noisy. Fixes bug 40083; bugfix on 0.2.8.1-alpha.
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes (testing):
|
||||
- When running the subsystem order check, use the python binary
|
||||
configured with the PYTHON environment variable. Fixes bug 40095;
|
||||
bugfix on 0.4.4.1-alpha.
|
@ -1,4 +0,0 @@
|
||||
o Documentation:
|
||||
- Replace most http:// URLs in our code and documentation with https://
|
||||
URLs. (We have left unchanged the code in src/ext/, and the text in
|
||||
LICENSE.) Closes ticket 31812. Patch from Jeremy Rand.
|
@ -1,5 +0,0 @@
|
||||
o Minor features (bootstrap reporting):
|
||||
- Report more detailed reasons for bootstrap failure when the failure
|
||||
happens due to a TLS error. Previously we would just call these errors
|
||||
"MISC" when they happened during read, and "DONE" when they
|
||||
happened during any other TLS operation. Closes ticket 32622.
|
@ -1,7 +0,0 @@
|
||||
o Minor features (directory authority):
|
||||
- Authorities now recommend protocol versions that are supported
|
||||
by Tor 0.3.5 and later. (Earlier versions of Tor have been
|
||||
deprecated since January of this year.) This recommendation
|
||||
will cause older clients and relays to give a warning on startup,
|
||||
or when they download a consensus directory.
|
||||
Closes ticket 32696.
|
@ -1,3 +0,0 @@
|
||||
o Minor features (linux seccomp2 sandbox):
|
||||
- Permit the unlinkat() syscall, which some Libc implementations
|
||||
use to implement unlink(). Closes ticket 33346.
|
@ -1,7 +0,0 @@
|
||||
o Minor bugfixes (rate limiting, bridges, pluggable transports):
|
||||
- On a bridge, treat all connections from an ExtORPort as remote
|
||||
by default for the purposes of rate-limiting. Previously,
|
||||
bridges would treat the connection as local unless they explicitly
|
||||
received a "USERADDR" command. ExtORPort connections still
|
||||
count as local if there is a USERADDR command with an explicit local
|
||||
address. Fixes bug 33747; bugfix on 0.2.5.1-alpha.
|
@ -1,7 +0,0 @@
|
||||
o Removed features (IPv6, revert):
|
||||
- Revert the client port prefer IPv6 feature because it breaks the
|
||||
torsocks use case. The SOCKS resolve command is lacking a mechanism to
|
||||
ask for a specific address family (v4 or v6) thus prioritizing IPv6 when
|
||||
an IPv4 address is asked on the resolve SOCKS interface resulting in a
|
||||
failure. Tor Browser explicitly set PreferIPv6 so this should not affect
|
||||
the majority of our users. Closes ticket 33796; bugfix on 0.4.4.1-alpha.
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfix (SOCKS, onion service client):
|
||||
- Also detect bad v3 onion service address of the wrong length when
|
||||
returning the F6 ExtendedErrors code. Fixes bug 33873; bugfix on
|
||||
0.4.3.1-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Minor bugfixes (relay, usability):
|
||||
- Adjust the rules for when to warn about having too many connections
|
||||
to other relays. Previously we'd tolerate up to 1.5 connections
|
||||
per relay on average. Now we tolerate more connections for directory
|
||||
authorities, and raise the number of total connections we need
|
||||
to see before we warn. Fixes bug 33880; bugfix on 0.3.1.1-alpha.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfix (onion service v3 client):
|
||||
- Remove a BUG() warning that can occur naturally. Fixes bug 34087; bugfix
|
||||
on 0.3.2.1-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Minor features (Linux seccomp2 sandbox, compilation):
|
||||
- Allow Tor to build on platforms where it doesn't know how to
|
||||
report which syscall had caused the linux seccomp2 sandbox
|
||||
to fail. This change should make the sandbox code more portable
|
||||
to less common Linux architectures.
|
||||
Closes ticket 34382.
|
@ -1,3 +0,0 @@
|
||||
o Deprecated features (onion service v2):
|
||||
- Add deprecation warning for onion service version 2. Tor now logs a
|
||||
warning once if a version 2 service is configured. Closes ticket 40003.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfix (control port, onion service):
|
||||
- Consistently use 'address' in "Invalid v3 address" response to
|
||||
ONION_CLIENT_AUTH commands. Fixes bug 40005; bugfix on 0.4.3.1-alpha.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfix (CI, Windows):
|
||||
- Don't use stdio 64 bit printf format when compiling with MINGW on
|
||||
Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.
|
@ -1,7 +0,0 @@
|
||||
o Removed features:
|
||||
- Our "check-local" test target no longer tries to use the Coccinelle
|
||||
semantic patching tool parse all the C files. While it is a good idea
|
||||
to try to make sure Coccinelle works on our C before we run a
|
||||
Coccinelle patch, doing so on every test run has proven to be disruptive.
|
||||
You can still run this tool manually with "make check-cocci". Closes
|
||||
ticket 40030.
|
@ -1,5 +0,0 @@
|
||||
o Major bugfixes (NSS):
|
||||
- When running with NSS enabled, make sure that NSS knows to expect
|
||||
nonblocking sockets. Previously, we set our TCP sockets as blocking,
|
||||
but did not tell NSS about the fact, which in turn could lead to
|
||||
unexpected blocking behavior. Fixes bug 40035; bugfix on 0.3.5.1-alpha.
|
@ -1,5 +0,0 @@
|
||||
o Major feature (fallback directory list):
|
||||
- Replace the 148 fallback directories originally included in
|
||||
Tor 0.4.1.4-rc (of which around 105 are still functional) with
|
||||
a list of 144 fallbacks generated in July 2020.
|
||||
Closes ticket 40061.
|
@ -1,6 +0,0 @@
|
||||
o Minor features (security):
|
||||
- Channels using obsolete versions of the Tor link protocol are no
|
||||
longer allowed to circumvent address-canonicity checks.
|
||||
(This is only a minor issue, since such channels have no way to
|
||||
set ed25519 keys, and therefore should always be rejected.)
|
||||
Closes ticket 40081.
|
@ -1,3 +0,0 @@
|
||||
o Minor features (defense in depth):
|
||||
- Wipe more data from connection address fields before returning them to
|
||||
the memory heap. Closes ticket 6198.
|
Loading…
Reference in New Issue
Block a user